期刊文献+
共找到375篇文章
< 1 2 19 >
每页显示 20 50 100
Experimentation with Personal Identifiable Information 被引量:3
1
作者 Sabah Al-Fedaghi Abdul Aziz Rashid Al-Azmi 《Intelligent Information Management》 2012年第4期123-133,共11页
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua... In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others. 展开更多
关键词 PERSONAL identifiable INFORMATION PUBLIC POLICY Issues PRIVACY Sensitivity
暂未订购
TGI-FPR: An Improved Multi-Label Password Guessing Model
2
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 Password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
Upholding Fundamental Principles and Breaking New Ground in Building China’s Independent Human Rights Knowledge System——A Theoretical Review of and Outlook for Human Rights Research in 2024
3
作者 WANG Liwan DI Lei CHEN Feng(Translated) 《The Journal of Human Rights》 2025年第2期462-501,共40页
In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and d... In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and discourses.Building an independent human rights knowledge system has become a core academic focus in China’s human rights research field.Upholding fundamental principles and breaking new ground are the key methodological principles for the process.China’s human rights research should be rooted in the“cultural lineage”by preserving the essence of fine traditional Chinese culture,guided by the“moral lineage”by adhering to the Marxist view on human rights,and anchored in the“Four-sphere Confidence”by upholding a distinct human rights development path,so as to define the historical coordinates and value stance of China’s independent human rights knowledge system.Meanwhile,it should maintain a high degree of openness in knowledge,theory,and methodology to address emerging rights demands and contribute to building a new global human rights governance order,so as to underscore the mission of China’s independent human rights knowledge system in the contemporary era and China’s responsibility as a major global actor.China’s human rights research should uphold the dialectical unity between the fundamental principles and innovations,and advance the systemic and theoretical interpretation of its independent human rights knowledge. 展开更多
关键词 China’s independent human rights knowledge system fundamental principles and innovations China’s human rights research China’s human rights development path identifiable human rights concepts in China
原文传递
TPII:tracking personally identifiable information via user behaviors in HTTP traffic 被引量:1
4
作者 Yi LIU Tian SONG Lejian LIAO 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期175-187,共13页
It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide preci... It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide precise and recommending services.Meanwhile,Internet service providers(ISPs)or local network providers also have strong requirements to collect PIIs for finer-grained traffic control and security services.However,it is a challenge to locate PIIs accurately in the massive data of network traffic just like looking a needle in a haystack.In this paper,we address this challenge by presenting an efficient and light-weight approach,namely TPII,which can locate and track PIIs from the HTTP layer rebuilt from raw network traffics.This approach only collects three features from HTTP fields as users'behaviors and then establishes a tree-based decision model to dig PIIs efficiently and accurately.Without any priori knowledge,TPII can identify any types of PIIs from any mobile applications,which has a broad vision of applications.We evaluate the proposed approach on a real dataset collected from a campus network with more than 13k users.The experimental results show that the precision and recall of TPII are 91.72%and 94.51%respectively and a parallel implementation of TPII can achieve 213 million records digging and labelling within one hour,reaching near to support 1Gbps wirespeed inspection in practice.Our approach provides network service providers a practical way to collect PIIs for better services. 展开更多
关键词 network traffic analysis personally identifiable information privacy leakage mobile applications HTTP
原文传递
Fully distributed identity-based threshold signatures with identifiable aborts
5
作者 Yan JIANG Youwen ZHU +1 位作者 Jian WANG Xingxin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期179-195,共17页
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel... Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment. 展开更多
关键词 threshold signatures single points of failure identifiable aborts
原文传递
Rainbow:reliable personally identifiable information retrieval across multi-cloud
6
作者 Zishuai Song Hui Ma +2 位作者 Shuzhou Sun Yansen Xin Rui Zhang 《Cybersecurity》 EI CSCD 2023年第4期88-108,共21页
Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Buildin... Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Building a PII retrieval service over multi-cloud,which is a modern strategy to make services stable where multiple servers are deployed,seems to be a promising solution.However,three major technical challenges remain to be solved.The first is the privacy and access control of PII.In fact,each entry in PII can be shared to different users with different access rights.Hence,flexible and fine-grained access control is needed.Second,a reliable user revocation mechanism is required to ensure that users can be revoked efficiently,even if few cloud servers are compromised or collapse,to avoid data leakage.Third,verifying the correctness of received PII and locating a misbehaved server when wrong data are returned is crucial to guarantee user’s privacy,but challenging to realize.In this paper,we propose Rainbow,a secure and practical PII retrieval scheme to solve the above issues.In particular,we design an important cryptographic tool,called Reliable Outsourced Attribute Based Encryption(ROABE)which provides data privacy,flexible and fine-grained access control,reliable immediate user revocation and verification for multiple servers simultaneously,to support Rainbow.Moreover,we present how to build Rainbow with ROABE and several necessary cloud techniques in real world.To evaluate the performance,we deploy Rainbow on multiple mainstream clouds,namely,AWS,GCP and Microsoft Azure,and experiment in browsers on mobile phones and computers.Both theoretical analysis and experimental results indicate that Rainbow is secure and practical. 展开更多
关键词 Personally identifiable information Data privacy Flexible access control Reliable user revocation Verification
原文传递
Unravelling the deception:identifying cheiro-oral syndrome in the emergency department——case reports
7
作者 Yongyin Qiu Shu Fang Ho 《World Journal of Emergency Medicine》 2025年第2期192-194,共3页
Patients with cheiro-oral syndrome(COS) often present with minor perioral and upper extremity sensory disturbances,which can be easily overlooked in busy emergency departments(EDs).^([1]) COS,a rare spectrum of stroke... Patients with cheiro-oral syndrome(COS) often present with minor perioral and upper extremity sensory disturbances,which can be easily overlooked in busy emergency departments(EDs).^([1]) COS,a rare spectrum of stroke syndromes,necessitates expeditious and aggressive modification of risk factors. 展开更多
关键词 ORAL identifying DEPARTMENT
暂未订购
Commentary on“Delayed covering causes the accumulation of motile sperm,leading to overestimation of sperm concentration and motility with a Makler counting chamber”
8
作者 Elisabetta Tosti 《Asian Journal of Andrology》 2025年第1期135-136,共2页
The analysis of the ejaculate,better known as spermiogram,represents the first and main step to identify whether a series of sperm quality parameters are within the norm and therefore are consistent with normal sperm ... The analysis of the ejaculate,better known as spermiogram,represents the first and main step to identify whether a series of sperm quality parameters are within the norm and therefore are consistent with normal sperm fertilizing capacity.Among these,sperm concentration and motility are the first parameters to be evaluated through an estimation carried out by expert examiners. 展开更多
关键词 identify whether series sperm quality parameters within delayed covering accumulation MOTILITY OVERESTIMATION makler counting chamber motile sperm sperm concentration
原文传递
Topology-driven directed synthesis of metal-organic frameworks
9
作者 Guoying Han Qazi Mohammad Junaid Xiao Feng 《Chinese Journal of Structural Chemistry》 2025年第3期10-11,共2页
Metal-organic frameworks(MOFs)have garnered widespread attention due to their designability and diversity[1].Customization has always been a pursuit of chemists and materials scientists[2].Topology provides a means of... Metal-organic frameworks(MOFs)have garnered widespread attention due to their designability and diversity[1].Customization has always been a pursuit of chemists and materials scientists[2].Topology provides a means of abstracting the complex structures of MOFs by identifying and classifying the fundamental building units and connection patterns,simplifying the understanding of MOF structures[3]. 展开更多
关键词 directed synthesis TOPOLOGY metal organic frameworks identifying classifying fundamental building units
原文传递
Dual-branch spatial-temporal decoupled fusion transformer for safety action recognition in smart grid substation
10
作者 HAO Yu ZHENG Hao +3 位作者 WANG Tongwen WANG Yu SUN Wei ZHANG Shujuan 《Optoelectronics Letters》 2025年第8期507-512,共6页
Smart grid substation operations often take place in hazardous environments and pose significant threats to the safety of power personnel.Relying solely on manual supervision can lead to inadequate oversight.In respon... Smart grid substation operations often take place in hazardous environments and pose significant threats to the safety of power personnel.Relying solely on manual supervision can lead to inadequate oversight.In response to the demand for technology to identify improper operations in substation work scenarios,this paper proposes a substation safety action recognition technology to avoid the misoperation and enhance the safety management.In general,this paper utilizes a dual-branch transformer network to extract spatial and temporal information from the video dataset of operational behaviors in complex substation environments.Firstly,in order to capture the spatial-temporal correlation of people's behaviors in smart grid substation,we devise a sparse attention module and a segmented linear attention module that are embedded into spatial branch transformer and temporal branch transformer respectively.To avoid the redundancy of spatial and temporal information,we fuse the temporal and spatial features using a tensor decomposition fusion module by a decoupled manner.Experimental results indicate that our proposed method accurately detects improper operational behaviors in substation work scenarios,outperforming other existing methods in terms of detection and recognition accuracy. 展开更多
关键词 identify improper operations manual supervision avoid misoperation spatial temporal substation safety action recognition technology dual branch decoupled fusion enhance safety managementin
原文传递
区分物理变化和化学变化
11
作者 朱利香 《疯狂英语(双语世界)》 2025年第2期56-58,80,共4页
Can you identify physical and chemical changes?Have a try!
关键词 identify physical chemical changeshave chemical change physical change
在线阅读 下载PDF
System Structure Analysis of the Factors Influencing the“Energy Trilemma”in China’s Natural Gas Industry
12
作者 Li Qiaochu Luo Pingya Zhang Peng 《China Oil & Gas》 2025年第3期34-40,共7页
Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimens... Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimensional system of“safety and stability-economic feasibility-low-carbon and environmental protection,”an influencing factor system for the“Energy Trilemma”in the natural gas industry is constructed. 展开更多
关键词 natural gas safety stability natural gas industry influencing factor system energy trilemma identifying key action point low carbon environmental protection economic feasibility
在线阅读 下载PDF
Cloning of qHD8^(BAS),a Quantitative Trait Locus Regulating Heading Date in Rice
13
作者 ZHANG Zhengjiu BIAN Ying +3 位作者 YANG Ruoju ZHANG Xiaobo GONG Junyi FAN Jiongjiong 《Rice science》 2025年第3期283-286,I0005-I0011,共11页
Heading date is one of the most important agronomic traits that directly affect rice yield and determines the regional adaptability in specific growing environments.As a short-day plant,rice can grow under long-day(LD... Heading date is one of the most important agronomic traits that directly affect rice yield and determines the regional adaptability in specific growing environments.As a short-day plant,rice can grow under long-day(LD)conditions due to the synergistic regulation of many photosensitive genes.Using a set of chromosome segment substitution lines(CSSLs)with the indica cultivar Huanghuazhan(HHZ)as the recipient parent and Basmati Surkh 89-15(BAS)as the donor parent,we identified a QTL locus. 展开更多
关键词 chromosome segment substitution lines cssls agronomic traits identified qtl locus indica cultivar quantitative trait locus synergistic regulation many photosensitive genesusing heading date CLONING
在线阅读 下载PDF
Innovative Pharmaceutical Research Facilitated by AI
14
《Journal of Pharmaceutical Analysis》 2025年第6期F0004-F0004,共1页
AI is revolutionizing the current paradigm of pharmaceutical research,addressing the challenges encountered at all stages of the process.AI driven drug discovery is based on biomedical big data and new algorithms to i... AI is revolutionizing the current paradigm of pharmaceutical research,addressing the challenges encountered at all stages of the process.AI driven drug discovery is based on biomedical big data and new algorithms to identify drug targets,screen and optimize active compounds,analyze drug properties,and facilitate drug production and quality control. 展开更多
关键词 drug discovery identify drug targetsscreen optimize active compoundsanalyze drug propertiesand artificial intelligence drug targets new algorithms innovative pharmaceutical research drug production quality control biomedical big data
在线阅读 下载PDF
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
15
作者 Siddharth M. Madikeri Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期378-395,共18页
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin... Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices. 展开更多
关键词 Privacy Enhancing Technology (PET) Personally identifiable Information (PII) OpenWPM Web Privacy
在线阅读 下载PDF
Re-identifying beef cattle using improved AlignedReID++ 被引量:1
16
作者 YING Xiaoyi ZHAO Jizheng +7 位作者 YANG Lingling ZHOU Xinyi WANG Lei GAO Yannian ZAN Linsen YANG Wucai LIU Han SONG Huaibo 《农业工程学报》 EI CAS CSCD 北大核心 2024年第18期132-146,共15页
Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium t... Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium to long distances over different cameras.However,beef cattle can tend to frequently move and change their feeding position during feeding.Furthermore,the great variations in their head direction and complex environments(light,occlusion,and background)can also lead to some difficulties in the recognition,particularly for the bio-similarities among individual cattle.Among them,AlignedReID++model is characterized by both global and local information for image matching.In particular,the dynamically matching local information(DMLI)algorithm has been introduced into the local branch to automatically align the horizontal local information.In this research,the AlignedReID++model was utilized and improved to achieve the better performance in cattle re-identification(ReID).Initially,triplet attention(TA)modules were integrated into the BottleNecks of ResNet50 Backbone.The feature extraction was then enhanced through cross-dimensional interactions with the minimal computational overhead.Since the TA modules in AlignedReID++baseline model increased the model size and floating point operations(FLOPs)by 0.005 M and 0.05 G,the rank-1 accuracy and mean average precision(mAP)were improved by 1.0 percentage points and 2.94 percentage points,respectively.Specifically,the rank-1 accuracies were outperformed by 0.86 percentage points and 0.12 percentage points,respectively,compared with the convolution block attention module(CBAM)and efficient channel attention(ECA)modules,although 0.94 percentage points were lower than that of squeeze-and-excitation(SE)modules.The mAP metric values were exceeded by 0.22,0.86 and 0.12 percentage points,respectively,compared with the SE,CBAM,and ECA modules.Additionally,the Cross-Entropy Loss function was replaced with the CosFace Loss function in the global branch of baseline model.CosFace Loss and Hard Triplet Loss were jointly employed to train the baseline model for the better identification on the similar individuals.AlignedReID++with CosFace Loss was outperformed the baseline model by 0.24 and 0.92 percentage points in the rank-1 accuracy and mAP,respectively,whereas,AlignedReID++with ArcFace Loss was exceeded by 0.36 and 0.56 percentage points,respectively.The improved model with the TA modules and CosFace Loss was achieved in a rank-1 accuracy of 94.42%,rank-5 accuracy of 98.78%,rank-10 accuracy of 99.34%,mAP of 63.90%,FLOPs of 5.45 G,frames per second(FPS)of 5.64,and model size of 23.78 M.The rank-1 accuracies were exceeded by 1.84,4.72,0.76 and 5.36 percentage points,respectively,compared with the baseline model,part-based convolutional baseline(PCB),multiple granularity network(MGN),and relation-aware global attention(RGA),while the mAP metrics were surpassed 6.42,5.86,4.30 and 7.38 percentage points,respectively.Meanwhile,the rank-1 accuracy was 0.98 percentage points lower than TransReID,but the mAP metric was exceeded by 3.90 percentage points.Moreover,the FLOPs of improved model were only 0.05 G larger than that of baseline model,while smaller than those of PCB,MGN,RGA,and TransReID by 0.68,6.51,25.4,and 16.55 G,respectively.The model size of improved model was 23.78 M,which was smaller than those of the baseline model,PCB,MGN,RGA,and TransReID by 0.03,2.33,45.06,14.53 and 62.85 M,respectively.The inference speed of improved model on a CPU was lower than those of PCB,MGN,and baseline model,but higher than TransReID and RGA.The t-SNE feature embedding visualization demonstrated that the global and local features were achieve in the better intra-class compactness and inter-class variability.Therefore,the improved model can be expected to effectively re-identify the beef cattle in natural environments of breeding farm,in order to monitor the individual feed intake and feeding time. 展开更多
关键词 method IDENTIFY beef cattle precision livestock re-identification AlignedReID++ deep learning
在线阅读 下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID) 被引量:1
17
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
在线阅读 下载PDF
DAIS: a method for identifying spatial domains based on density clustering of spatial omics data
18
作者 Qichao Yu Ru Tian +1 位作者 Xin Jin Liang Wu 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2024年第8期884-887,共4页
In multicellular organisms,the spatial arrangement of cells profoundly influences the biological functions of tissues,underscoring the importance of identifying spatial domains in biology.Recent advancements in spatia... In multicellular organisms,the spatial arrangement of cells profoundly influences the biological functions of tissues,underscoring the importance of identifying spatial domains in biology.Recent advancements in spatial omics,particularly spatial transcriptomics(ST)(Bressan et al.,2023),have enhanced our understanding of tissue spatial organization(Zhang et al.,2022;Tian et al.,2023). 展开更多
关键词 arrangement identifying DOMAINS
原文传递
Analysis of the Influence of Woodcut Works of Anti-Japanese War on the National Spiritual Identity of Young People
19
作者 ZHANG Tong-yuan 《Journal of Literature and Art Studies》 2024年第10期916-920,共5页
As one of the important art forms during the Anti-Japanese War in China, woodcut is not only a tool for literary and artistic workers to express the spirit of Anti-Japanese War, but also a medium to inspire the people... As one of the important art forms during the Anti-Japanese War in China, woodcut is not only a tool for literary and artistic workers to express the spirit of Anti-Japanese War, but also a medium to inspire the people and arouse patriotic feelings. Through a systematic analysis of the historical background and artistic characteristics of woodcuts of the Anti-Japanese War and their impact on the national spiritual identity of young people, this paper aims to explore how woodcuts enlightens and inspires young people’s national consciousness through visual language and spiritual connotation, and enhances their sense of belonging to the country and the nation. 展开更多
关键词 anti-Japanese woodcut national spirit TEENAGERS identify with artistic influence
在线阅读 下载PDF
Analysis on Genetic Diversity of 40 Flowering Cherry Cultivars and Construction of Molecular ID Based on SSR Markers
20
作者 Chaoren Nie Xiaoguo Xu +3 位作者 Xiaoqin Zhang Hongbing Sun Jingya Yu Wensheng Xia 《Agricultural Sciences》 2024年第2期256-273,共18页
Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated a... Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated as an important woody ornamental plant in worldwide, especially Japan, China. However, owning to the morphological similarity, many cultivars are distinguished hardly in non-flowering season. Here, we evaluated the genetic diversity and genetic relationship of 40 flowering cherry cultivars, which are mainly cultivated in China. We selected 13 polymorphicprimers to amplify to allele fragments with fluorescent-labeled capillary electrophoresis technology. The population structure analysis results show that these cultivars could be divided into 4 subpopulations. At the population level, N<sub>a</sub> and N<sub>e</sub> were 6.062, 4.326, respectively. H<sub>o</sub> and H<sub>e</sub> were 0.458 and 0.670, respectively. The Shannon’s information index (I) was 1.417. The Pop3, which originated from P. serrulata, had the highest H<sub>o</sub>, H<sub>e</sub>, and I among the 4 subpopulations. AMOVA showed that only 4% of genetic variation came from populations, the 39% variation came from individuals and 57% (p < 0.05) came from intra-individuals. 5 polymorphic SSR primers were selected to construct molecular ID code system of these cultivars. This analysis on the genetic diversity and relationship of the 40 flowering cherry cultivars will help to insight into the genetic background, relationship of these flowering cherry cultivars and promote to identify similar cultivars. 展开更多
关键词 Flowering Cherry SSR Genetic Relationship Molecular ID Identifying Cultivars
在线阅读 下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部